必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.252.241.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.252.241.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:16:12 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
80.241.252.148.in-addr.arpa domain name pointer no-reverse-dns.metronet-uk.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.241.252.148.in-addr.arpa	name = no-reverse-dns.metronet-uk.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.175.23.46 attackspam
Aug 24 20:55:43 [host] sshd[6736]: Invalid user consulta from 134.175.23.46
Aug 24 20:55:43 [host] sshd[6736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.23.46
Aug 24 20:55:45 [host] sshd[6736]: Failed password for invalid user consulta from 134.175.23.46 port 34416 ssh2
2019-08-25 03:58:47
66.249.69.237 attackspam
Aug 24 11:22:30   DDOS Attack: SRC=66.249.69.237 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=106  DF PROTO=TCP SPT=35947 DPT=443 WINDOW=0 RES=0x00 RST URGP=0
2019-08-25 03:21:40
220.203.63.55 attackspam
port scan and connect, tcp 23 (telnet)
2019-08-25 03:29:35
14.63.223.226 attack
Aug 24 11:55:23 hb sshd\[30081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.223.226  user=root
Aug 24 11:55:25 hb sshd\[30081\]: Failed password for root from 14.63.223.226 port 45998 ssh2
Aug 24 12:03:01 hb sshd\[30720\]: Invalid user slackware from 14.63.223.226
Aug 24 12:03:01 hb sshd\[30720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.223.226
Aug 24 12:03:03 hb sshd\[30720\]: Failed password for invalid user slackware from 14.63.223.226 port 42203 ssh2
2019-08-25 03:49:07
14.35.249.205 attack
Invalid user zabbix from 14.35.249.205 port 45692
2019-08-25 03:21:08
138.197.162.28 attackbots
Aug 24 19:03:07 MK-Soft-VM4 sshd\[22564\]: Invalid user jannine from 138.197.162.28 port 49812
Aug 24 19:03:07 MK-Soft-VM4 sshd\[22564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.28
Aug 24 19:03:08 MK-Soft-VM4 sshd\[22564\]: Failed password for invalid user jannine from 138.197.162.28 port 49812 ssh2
...
2019-08-25 03:59:18
78.203.192.97 attackspam
/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=busybox&curpath=/¤tsetting.htm=1
2019-08-25 03:51:31
171.127.194.77 attack
Unauthorised access (Aug 24) SRC=171.127.194.77 LEN=40 TTL=49 ID=35456 TCP DPT=8080 WINDOW=14326 SYN 
Unauthorised access (Aug 24) SRC=171.127.194.77 LEN=40 TTL=49 ID=63333 TCP DPT=8080 WINDOW=24215 SYN 
Unauthorised access (Aug 24) SRC=171.127.194.77 LEN=40 TTL=49 ID=50915 TCP DPT=8080 WINDOW=24215 SYN 
Unauthorised access (Aug 24) SRC=171.127.194.77 LEN=40 TTL=49 ID=31199 TCP DPT=8080 WINDOW=24215 SYN
2019-08-25 04:01:22
46.101.76.236 attackspambots
Aug 24 15:12:09 TORMINT sshd\[8380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236  user=root
Aug 24 15:12:11 TORMINT sshd\[8380\]: Failed password for root from 46.101.76.236 port 50428 ssh2
Aug 24 15:18:32 TORMINT sshd\[8698\]: Invalid user rppt from 46.101.76.236
Aug 24 15:18:32 TORMINT sshd\[8698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236
...
2019-08-25 03:40:35
190.52.128.8 attack
Invalid user zb from 190.52.128.8 port 36548
2019-08-25 03:43:44
59.120.189.234 attackbotsspam
Aug 24 20:05:16 debian sshd\[26355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.189.234  user=root
Aug 24 20:05:18 debian sshd\[26355\]: Failed password for root from 59.120.189.234 port 48656 ssh2
...
2019-08-25 03:17:11
200.164.217.210 attackspam
Aug 24 19:30:31 XXX sshd[58997]: Invalid user testuser from 200.164.217.210 port 50383
2019-08-25 03:56:34
54.39.150.116 attack
Invalid user brd from 54.39.150.116 port 35182
2019-08-25 03:24:13
71.66.168.146 attackbotsspam
Aug 24 20:11:19 herz-der-gamer sshd[17683]: Invalid user d from 71.66.168.146 port 18621
Aug 24 20:11:19 herz-der-gamer sshd[17683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.66.168.146
Aug 24 20:11:19 herz-der-gamer sshd[17683]: Invalid user d from 71.66.168.146 port 18621
Aug 24 20:11:22 herz-der-gamer sshd[17683]: Failed password for invalid user d from 71.66.168.146 port 18621 ssh2
...
2019-08-25 03:39:11
189.59.237.44 attackspam
Aug 24 17:56:15 yabzik sshd[430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.59.237.44
Aug 24 17:56:17 yabzik sshd[430]: Failed password for invalid user ain from 189.59.237.44 port 62615 ssh2
Aug 24 18:04:29 yabzik sshd[3510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.59.237.44
2019-08-25 03:42:14

最近上报的IP列表

168.207.139.188 124.248.87.188 151.6.49.38 200.219.25.120
26.112.176.125 32.167.199.51 14.155.101.181 16.197.133.191
232.182.247.88 47.131.182.89 14.45.69.37 162.81.189.33
162.113.4.24 221.101.77.33 76.215.236.178 119.120.161.166
151.204.87.245 66.224.18.148 173.114.58.216 184.210.93.169